-
2
-
-
71749089487
-
Cloud computing's stormy side
-
Feb
-
Greenberg, A. Cloud Computing's Stormy Side. Forbes Magazine, Feb 2008.
-
(2008)
Forbes Magazine
-
-
Greenberg, A.1
-
4
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
Josh Benaloh, Melissa Chase, Eric Horvitz, Kristin Lauter. Patient controlled encryption: ensuring privacy of electronic medical records. Proceedings of the 2009 ACM workshop on Cloud computing security, pages 103-114, Nov 2009.
-
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, Issue.2009
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
5
-
-
69949134141
-
-
Jul
-
Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao. Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases, pages 185-201, Jul 2009.
-
(2009)
Privacy-preserving Computation and Verification of Aggregate Queries on Outsourced Databases
, pp. 185-201
-
-
Thompson, B.1
Haber, S.2
Horne, W.G.3
Sander, T.4
Yao, D.5
-
6
-
-
70849131456
-
Secure kNN computation on encrypted databases
-
Jun
-
Wai Kit Wong, David Wai-lok Cheung, Ben Kao, Nikos Mamoulis. Secure kNN computation on encrypted databases. Proceedings of the 35th SIGMOD international conference on Management of data, pages 139-152, Jun 2009.
-
(2009)
Proceedings of the 35th SIGMOD International Conference on Management of Data
, pp. 139-152
-
-
Wai, K.W.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
-
9
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou. Ensuring Data Storage Security in Cloud Computing. In The 17th International Workshop on IWQoS, pages 1-7, 2009.
-
(2009)
The 17th International Workshop on IWQoS
, pp. 1-7
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
10
-
-
74049154660
-
Secure and efficient access to outsourced data
-
Weichao Wang, Zhiwei Li, Rodney Owens, and Bharat Bhargava. Secure and Efficient Access to Outsourced Data. Proceedings of the 2009 ACM workshop on Cloud computing security, pages 55-66, Nov 2009.
-
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, Issue.2009
, pp. 55-66
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.4
-
11
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
M.J. Atallah, M. Blanton, N. Fazio, and K.B. Frikken. Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur., 12(3):1-43, 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.3
, pp. 1-43
-
-
Atallah, M.J.1
Blanton, M.2
Fazio, N.3
Frikken, K.B.4
-
12
-
-
85011043313
-
Over-encryption: Management of access control evolution on OutSourced data
-
S.D.C.di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-encryption: Management of Access Control Evolution on OutSourced Data. In Proceedings of the international conference on Very large databases, pages 123-134, 2007.
-
(2007)
Proceedings of the International Conference on Very Large Databases
, pp. 123-134
-
-
Di Vimercati, S.D.C.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
13
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
M. Kallahalla, E. Riedel, R. Swaminathan, Q. Wang, and K. Fu. Plutus: Scalable Secure File Sharing on Untrusted Storage. In Proceedings of the USENIX Conference on File and Storage Technologies, pages 29-42, 2003.
-
(2003)
Proceedings of the USENIX Conference on File and Storage Technologies
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
14
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
M.J. Atallah, M. Blanton, N. Fazio, and K.b. Frikken. Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur., 12(3), pages 1-43, 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.3
, pp. 1-43
-
-
Atallah, M.J.1
Blanton, M.2
Fazio, N.3
Frikken, K.B.4
|